{"id":"CVE-2016-4000","details":"Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.","aliases":["GHSA-6r7r-jj8h-pq6v"],"modified":"2026-03-12T22:19:58.811985Z","published":"2017-07-06T16:29:00.203Z","related":["SNYK-JAVA-ORGPYTHON-31451"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/105647"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"WEB","url":"https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3893"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-28"},{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"ADVISORY","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859"},{"type":"ADVISORY","url":"http://bugs.jython.org/issue2454"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"ADVISORY","url":"https://hg.python.org/jython/file/v2.7.1rc1/NEWS"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2016-4000"},{"type":"FIX","url":"https://hg.python.org/jython/rev/d06e29d100c0"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4000.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}